Results (740)
Search Parameters:
Keyword: ProcessApplication Layer Security Authentication Protocols for the Internet of Things: A Survey
Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…
Read MoreA Study on the Efficiency of Hybrid Models in Forecasting Precipitations and Water Inflow Albania Case Study
Climatic changes have a significant impact on many real life processes. Climacteric position of Albania makes precipitations and water inflows in HPP the main variables influencing the amount of electric energy produced in the country. Taking into account their volatility it has considerably increased the need of using hybrid models to improve the quality of…
Read MoreOver-The-Air Testing of Automotive Antennas and Wireless Links in The Installed State on The Basis of LTE Downlink Communication Parameters
Modern automobiles have been turning more and more into wireless sensor and communication networks. Accordingly, the number of radio systems is steadily increasing. Due to strict safety requirements, these radio systems need to be tested extensively for functionality and reliability, especially under poor radio channel conditions. Beside the large electrical size of cars at frequencies…
Read MoreObserving and Forecasting the Trajectory of the Thrown Body with use of Genetic Programming
Robotic catching of thrown objects is one of the common robotic tasks, which is explored in a number of papers. This task includes subtask of tracking and forecasting the trajectory of the thrown object. Here we propose an algorithm for estimating future trajectory based on video signal from two cameras. Most of existing implementations use…
Read MoreCritical Embedded Systems Development Using Formal Methods and Statistical Reliability Metrics
Trusted systems are becoming more integrated into everyday life. Security and reliability are at the forefront of trusted system design and are often directed at hardware-only solutions, especially for safety critical systems. This is because hardware has a well-established process for achieving strong, precise, and reliable systems. These attributes have been achieved in the area…
Read MoreDevelopment of Application Specific Electronic Nose for Monitoring the Atmospheric Hazards in Confined Space
The presence of atmospheric hazards in confined space can contribute towards atmospheric hazards accidents that threaten the worker safety and industry progress. To avoid this, the environment needs to be observed. The air sample can be monitored using the integration of electronic nose (e-nose) and mobile robot. Current technology to monitor the atmospheric hazards is…
Read MoreLow Contrast Image Enhancement Using Convolutional Neural Network with Simple Reflection Model
Low contrast images degrade the performance of image processing system. To solve the issue, plenty of image enhancement methods have been proposed. But the methods work properly on the fixed environment or specific images. The methods dependent on fixed image conditions cannot perform image enhancement properly and perspective of smart device users, algorithms including iterative…
Read MoreCan parallelization save the (computing) world?
As all other laws of the growth in computing, the growth of computing performance also shows a ”logistic curve”-like behavior, rather than an unlimited exponential growth. The stalling of the single-processor performance experienced nearly two decades ago forced computer experts to look for alternative methods, mainly for some kind of parallelization. Solving the task needs…
Read MoreExtending the Life of Legacy Robots: MDS-Ach via x-Ach
Our work demonstrates how to use contemporary software tools on older or “legacy” robots while keeping compatibility with the original control, tools, and calibration procedures. This is done by implementing a lightweight middle-ware called MDS-Ach connected directly to the hardware communications layer of the robot’s control system. The MDS-Ach middle-ware, which relies on the x-Ach…
Read MoreA Proposed Architecture for Parallel HPC-based Resource Management System for Big Data Applications
Big data can be considered to be at the forefront of the present and future research activities. The volume of data needing to be processed is growing dramatically in both velocity and variety. In response, many big data technologies have emerged to tackle the challenges of collecting, processing and storing such large-scale datasets. High-performance computing…
Read MoreA Practical PIR-based Scheme for Discovering Nearby Places for Smartphone Applications
We present a privacy-preserving approach for discovering nearby places of interest to Alice. In this approach, the proposed protocol allows Alice to learn whether there is any place that she is looking for near her. However, the location-based service (LBS) that tries to help Alice to find nearby places does not learn Alice’s location. Alice…
Read MoreA Wearable Exoskeleton Rehabilitation Device for Paralysis – A Comprehensive Study
As the technology grows scientists and engineers are trying to combine their work to compensate some body parts that is lost. Prosthetic devices grabbed the attention of most of the doctors and engineers working on solution for lost body parts. Generally prosthetic devices are either external wearable devices or internal ones. Such devices may depend…
Read MoreAutomation System for Regulation Optimization in Power Transformer Design
Large power transformers generally include a customer request for a technically appropriate regulation unit. The selection process of the regulation unit consists of defining the required input data, performing mathematical calculations necessary to find the technical limit values that the regulation unit has to satisfy, and finally optimizing and selecting the appropriate regulation unit. The…
Read MoreOmni-directional Dual-Band Patch Antenna for the LMDS and WiGig Wireless Applications
In this paper an omnidirectional dual band monopole antenna at 28 GHz and 60 GHz which is fit for indoor and outdoor wireless applications is developed. The proposed antenna consists of two rectangular patches with a T folded patch. The design, analysis, and optimization processes through this article are executed by the numerical method, Finite…
Read MorePerfect Molding Challenges and The Limitations “A Case Study”
Driven by today’s market demand, semiconductor is pushing towards the zero-defect direction. The improvement demanded in semiconductor manufacturing is becoming increasingly challenging. In this paper, common molding defects comprise of voids, incomplete fills, and piping holes are studied systematically, focusing on three key areas: 1) Potential mold flow weakness; 2) Molding temperature stability; as well…
Read MoreReal Time Eye Tracking and Detection- A Driving Assistance System
Distraction, drowsiness, and fatigue are the main factors of car accidents recently. To solve such problems, an Eye-tracking system based on camera is proposed in this paper. The system detects the driver’s Distraction or sleepiness and gives an alert to the driver as an assistance system. The camera best position is chosen to be on…
Read MoreAnalysis of Garri Frying Machine Manufacturing in Nigeria: Design Innovation
Production of garri (edible processed and granulated form of cassava) and sustaining the production process has become so laborious, time consuming, and predisposes one to some form of danger, especially as it concerns the hot fire that one is disposed to during the process. In west African tradition, where this garri serves as one of…
Read MoreSemi-Autonomous Robot Control System with an improved 3D Vision Scheme for Search and Rescue Missions. A joint research collaboration between South Africa and Argentina
Rescue operations require technology to assist the rescue process. The robotic technology in these missions is becoming very important. The important aspects investigated in this study are the integration of a mechatronic system that will allow for a robotic platform with a vision system. The research collaboration between Argentina and South Africa is discussed, with…
Read MoreMRI images Enhancement and Brain Tumor Segmentation
Brain tumor is the abnormal growth of cancerous cells in Brain. The development of automated methods for segmenting brain tumors remains one of the most difficult tasks in medical data processing. Accurate segmentation can improve diagnosis, such as evaluating tumor volume. However, manual segmentation in magnetic resonance data is a laborious task. The main problem…
Read MoreMachine Learning Applied to GRBAS Voice Quality Assessment
Voice problems are routinely assessed in hospital voice clinics by speech and language therapists (SLTs) who are highly skilled in making audio-perceptual evaluations of voice quality. The evaluations are often presented numerically in the form of five-dimensional ‘GRBAS’ scores. Computerised voice quality assessment may be carried out using digital signal processing (DSP) techniques which process…
Read MoreParallelizing Combinatorial Optimization Heuristics with GPUs
Combinatorial optimization problems are often NP-hard and too complex to be solved within a reasonable time frame by exact methods. Heuristic methods which do not offer a convergence guarantee could obtain some satisfactory resolution for combinatorial optimization problems. However, it is not only very time consuming for Central Processing Units (CPU) but also very difficult…
Read MoreClosed Approach of a Decoder Mobile for the 406 Mhz Distress Beacon
This article presents the design and realization of decoder mobile for distress beacon 406 MHz. The use of the sparse Fourier transforms in the processing of distress beacon signals. The characteristics of these decoders are mobility, able to decode all the frequencies of the beacons. It locates with great precision the location of the emitting…
Read MoreAnalysis Refactoring with Tools
The drive for this report is to inaugurate the innumerable techniques espoused by the refactoring tools in coding development. The software product is a very complex and time-consuming process of development. Difficulty understanding and maintaining poorly designed software systems Software maintenance can take up to 50% of total development costs for software production. As a…
Read MoreA Development of Agility Mode in Cardiopulmonary Resuscitation Learning Support System Visualized by Augmented Reality
This paper showed visualization of technics about cardiopulmonary resuscitation contributed to acquiring the skills and understanding them. Especially, this system is focused on the individuality in each object (men, women, and babies) There are problems of a general cardiopulmonary resuscitation (CPR) training because learners are generally taught by instruction based on a subjective judgment. Because…
Read MoreHolistic Access Control and Privacy Infrastructure in Distributed Environment
This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…
Read More
